CN115150246A - Mass real-time Internet of things-oriented chain loading method based on novel nested chain architecture - Google Patents

Mass real-time Internet of things-oriented chain loading method based on novel nested chain architecture Download PDF

Info

Publication number
CN115150246A
CN115150246A CN202210413649.0A CN202210413649A CN115150246A CN 115150246 A CN115150246 A CN 115150246A CN 202210413649 A CN202210413649 A CN 202210413649A CN 115150246 A CN115150246 A CN 115150246A
Authority
CN
China
Prior art keywords
chain
node
transaction
nodes
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210413649.0A
Other languages
Chinese (zh)
Other versions
CN115150246B (en
Inventor
张宇超
何潇风
王小天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202210413649.0A priority Critical patent/CN115150246B/en
Publication of CN115150246A publication Critical patent/CN115150246A/en
Application granted granted Critical
Publication of CN115150246B publication Critical patent/CN115150246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/044Network management architectures or arrangements comprising hierarchical management structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • H04L41/083Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5077Network service management, e.g. ensuring proper service fulfilment according to agreements wherein the managed service relates to simple transport services, i.e. providing only network infrastructure
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a massive real-time Internet of things-oriented uplink method based on a novel nested chain architecture, and provides a nested chain architecture with a parent chain and a plurality of child chains coexisting, namely the parent chain maintains a small-scale node number and is mainly responsible for collecting important information for IoT data verification, identity information recording, global data management and the like; the sub-chains are multiple in number, multiple in nodes, high in flexibility and expansibility, and used for receiving and storing local IoT data and providing processing before uplink for the application data under the chain, so that massive data of the application network under the chain can be completely, timely and efficiently uploaded. Meanwhile, the dynamic deployment method for the application network subchain nodes based on the nested chain design is used for researching how to dynamically sense and investigate malicious nodes, efficiently selecting and replacing parent link access nodes so as to ensure the legality and safety of the nodes and efficient uplink of data and realize high-availability subchain dynamic access.

Description

Mass real-time Internet of things-oriented chain loading method based on novel nested chain architecture
Technical Field
The invention relates to the technical field of computers, in particular to a massive real-time Internet of things-oriented chain linking method based on a novel nested chain architecture.
Background
The block chain is a novel application mode combining distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and other computer technologies, and is widely applied to a plurality of frontier fields by virtue of characteristics of decentralization, no tampering, traceability, anonymity and the like. With the rapid development of internet of things (IoT) and 5G technologies, massive real-time data generated in application scenarios such as internet of vehicles and telemedicine become a key challenge for the current blockchain technology to land on the ground.
A block chain system such as superhedger Fabric in alliance has higher throughput and lower latency, and can implement authentication of node identity and access control of data. However, the expansibility, especially the number of nodes, is limited compared with the public chain, and as the number of nodes of the added blockchain increases, the system overhead increases sharply and the performance decreases sharply.
Disclosure of Invention
The invention provides a massive real-time internet of things oriented uplink method based on a novel nested chain architecture, aiming at the problem that the number of block chain links of a alliance chain is increased, the system overhead is increased rapidly, and the performance is reduced rapidly, so that the under-chain information is difficult to cooperate with the on-chain data.
In order to achieve the above purpose, the invention provides the following technical scheme:
a massive real-time Internet of things-oriented chain loading method based on a novel nested chain architecture is characterized in that a block chain system comprises a single parent chain and a plurality of sub-chains, and the constituent nodes of the parent chain and the sub-chains are divided into two types: the common node is only responsible for the local data management function; the communication node has the same function as a common node and also has a cross-link communication function; the communication nodes in the parent chain and the child chain together construct a communication channel, namely a relay chain, which is used for data exchange among the chains; the sub-chain coexists with the parent chain in a nested structure and is used for realizing dynamic sensing of sub-chain communication nodes based on machine learning for large-scale application data under the link, searching malicious nodes, efficiently selecting and replacing parent chain access nodes and realizing high-availability sub-chain dynamic access.
Furthermore, in the selection process of the sub-chain access node, the improved GCN algorithm is used for sensing and classifying the nodes, so that the high-efficiency nodes in the sub-chain are screened out for inter-chain communication.
Further, the selecting process of the child chain access node is as follows:
s31, graph construction:
constructing transaction graphs by using the characteristic attributes of the nodes in the block chain and the transaction information among the nodes, wherein each transaction graph is a directed graph which is composed of the nodes and edges and contains edge information and is used as the input of a neural network model;
s32, graph learning:
the GCN model initially inputs a matrix generated by graph construction, and then node states are updated through hierarchical propagation;
s33, node classification and parent chain cooperative evaluation:
obtaining the state vector of each node after T iterations in the last layer of the GCN model
Figure BDA0003595688060000021
Wherein t is the output characteristic number of each node, namely the node category number; for each node application
Figure BDA0003595688060000022
Mapping the model output value into a probability value to obtain the classification probability of each node:
Figure BDA0003595688060000023
the vector represents the probability that the ith node is in the t categories respectively, namely the probability values of the nodes which are used as an access node, a candidate node, a common node and a low-efficiency node respectively, and the maximum probability is taken as the node type to obtain the classification probability of each node; meanwhile, the access node selected by the child chain is evaluated by the parent chain according to the historical update information of the node, and if the history of the node is used as the times T of the low-efficiency node>Threshold Th, the parent chain requests the child chain to replace the access node from the list of candidate nodes.
Further, the graph construction process mainly comprises the following key parameters:
node feature matrix
Figure BDA0003595688060000024
The characteristic attribute of the kth node is expressed as:
Figure BDA0003595688060000025
Figure BDA0003595688060000026
f 1 number of transactions initiated for the round, f 2 Number of transactions initiated for previous round, s 1 Is the current node type, s 2 Is the type of the node of the previous wheel;
weight matrix
Figure BDA0003595688060000027
A transaction weight matrix of type r, the weight matrix being defined by transaction weights
Figure BDA0003595688060000028
Constructing, namely the times of constructing a certain edge in the transaction graph, namely the transaction times from the node i to the node j in the current round;
transaction delay matrix
Figure BDA0003595688060000029
By
Figure BDA00035956880600000210
Constructing, wherein the value represents the transaction delay level of the type r from the node i to the node j in the M transactions in the current round, the order of the transaction delay level is preset to be n, namely, n delay levels are provided in total, and the extreme value t of all transaction delays in the current round is taken max 、t min Push and press
Figure BDA0003595688060000031
Grading uniformly; average transaction delay of type r between node i and node j in the current round
Figure BDA0003595688060000032
Figure BDA0003595688060000033
Determining t from a rank-dividing range cur The grade is obtained
Figure BDA0003595688060000034
Network delay matrix
Figure BDA0003595688060000035
By
Figure BDA0003595688060000036
Constructing, wherein the value represents the delay level of the network environment when the transaction with the type r is carried out from the node i to the node j in the M transactions in the current round, the delay level is divided into n levels, and the network ping value t of each transaction with the type r in the current round is counted max 、t min Push and press
Figure BDA0003595688060000037
Uniformly grading, calculating average network time delay, and determining grade to obtain
Figure BDA0003595688060000038
Further, in the graph learning process, the propagation model of node forward update is defined as:
Figure BDA0003595688060000039
wherein
Figure BDA00035956880600000310
Representing the hidden state of the ith node in the l +1 layer neural network;
alpha and beta are respectively the weight of transaction delay and network delay, and alpha + beta =1;
σ is a ReLU activation function;
normalization factor
Figure BDA00035956880600000311
Figure BDA00035956880600000312
A node set representing that r type transaction is carried out between the current round and the node i;
Figure BDA00035956880600000313
a weight matrix representing the first layer neural network with transaction type r.
Furthermore, in the graph learning process, the iteration times of the state vector is defined as T, namely l is less than or equal to T; the input to the model layer I is represented as
Figure BDA00035956880600000314
Wherein H (0) = V, forward propagation makes a total of T state updates.
The chain linking method based on the novel nested chain architecture and oriented to the mass real-time Internet of things comprises the following operation flows:
s1, original data processing: the method comprises the steps that the Internet of things equipment sends original data to a sub chain through a gateway, firstly, the gateway conducts identity verification on the Internet of things equipment, and after the verification is passed, preprocessing is conducted on the original data before chain linking and the original data are sent to the sub chain;
s2, request sending:
the sub-chain initiates a communication request to the parent chain and sends the request to a system sequencing service;
s3, selecting a communication transaction node:
defining a sub-chain to realize node selection every M times of transactions, and selecting a high-efficiency node by the sub-chain according to situation perception of nodes in the chain to serve as a communication node accessed to a parent chain; the parent chain has a fixed communication node for each sub-chain;
s4, data sending:
the sequencing service establishes a channel and adds the communication nodes selected by the two parties into the channel to form a relay chain, and the sub-chain communication nodes read specified data from the chain and submit the data to the relay chain after being processed by a specific intelligent contract;
s5, data verification and confirmation:
the two communication nodes in the relay chain reach consensus, data is written into local blocks of the two communication nodes, and the communication node of the parent chain reads the data from the local, and submits the data to the chain and reaches consensus after verifying the integrity and consistency of the received data, so as to complete data exchange;
s6, transaction information storage:
after each transaction is completed, the transaction event is stored in the sub-chain in a key-value pair mode for next node selection, and node updating information is simultaneously sent to the relay chain and then backed up in the parent chain for evaluation of the parent chain on the sub-chain node.
Further, in step S4, the sub-chain uploads only the hash digest of the processed data of the internet of things to the main chain.
Further, in step S6, the transaction information attributes are as follows: < sender, receiver, type, transaction delay, network delay >, sender represents a transaction initiator, receiver represents a transaction receiver, type represents a transaction type, transaction delay represents a transaction delay (in ms), and network delay represents a network delay.
Further, if the transaction passes through the sub-chain node selection process, the type update event of each node is stored in the sub-chain in a key-value pair form, the attributes include < ID, category, transactions >, the ID represents the node ID, the category represents the node type after the update, and the transactions represent the number of transactions initiated by the node in the current round.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a novel nested chain architecture-based mass real-time Internet of things-oriented uplink method, which provides a nested chain architecture with a parent chain and a plurality of sub-chains coexisting, namely the parent chain maintains a small-scale node number and is mainly responsible for collecting important information for IoT data verification, identity information recording, global data management and the like; the sub-chains are multiple in number, multiple in nodes, high in flexibility and expansibility, and used for receiving and storing local IoT data and providing processing before uplink for the application data under the chain, so that massive data of the application network under the chain can be completely, timely and efficiently uploaded. Meanwhile, the dynamic deployment method for the application network subchain nodes based on the nested chain design is used for researching how to dynamically sense and investigate malicious nodes, efficiently selecting and replacing parent link access nodes so as to ensure the legality and safety of the nodes and efficient uplink of data and realize high-availability subchain dynamic access.
Compared with the prior art, the massive real-time Internet of things-oriented chain loading method based on the novel nested chain architecture has the advantages that: (1) And mass real-time data are efficiently processed, and the pressure of a father chain is relieved. The sub-chain coexists with the parent chain in a nested structure and is used for butt joint of large-scale application data under the chain, the dimensionality reduction and the frequency reduction of the data are achieved, and the possibility is provided for data collaboration under the chain. (2) The method has the advantages of having a high-performance stable subchain, and ensuring the integrity of data information and the high efficiency of data uplink. A situation awareness method based on machine learning is adopted to dynamically control subchain nodes, a deep neural network is designed to mine potential features, low-efficiency nodes are screened, and the legality of authentication nodes, high expansibility of subchains and stable communication among parent subchains are guaranteed. (3) Aiming at the singleness of the evaluation nodes of only the sub-chain, in order to more accurately classify the nodes, a scheme for cooperatively evaluating the parent chain and the sub-chain is designed to improve the efficiency of identifying the inefficient nodes.
Drawings
In order to more clearly illustrate the embodiments of the present application or technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart of a method provided in an embodiment of the present invention.
Fig. 2 is a schematic diagram of a nested chain architecture according to an embodiment of the present invention.
Fig. 3 is a flowchart of a node-aware algorithm provided in an embodiment of the present invention.
Fig. 4 is a node feature vector provided in the embodiment of the present invention.
Fig. 5 is a weight matrix provided in an embodiment of the invention.
Detailed Description
For a better understanding of the present solution, the method of the present invention is described in detail below with reference to the accompanying drawings.
Aiming at the mass scale and high real-time performance of the current block chain network application data, the invention designs a nested chain architecture with the cooperation of parent and child chains, as shown in fig. 2. The basic idea is that a plurality of small-scale block chains are adopted in parallel to avoid performance loss caused by continuous addition of nodes in a single chain, and meanwhile, independence of parent-child chains in the system and information exchange among the parent-child chains are guaranteed, and the block chain system can be completely, timely and efficiently uploaded by application data.
In order to better manage the whole system and adapt to the needs of the actual scene of the internet of things, the system consists of a single parent chain (Main chain) and a plurality of Sub-chains (Sub chains), each chain can independently bear the function of a small-scale block chain, and the constituent nodes of the system are mainly divided into two types: the common node is only responsible for the local data management function; the communication nodes have a cross-link communication function besides the same function as a common node, and the communication nodes in the parent Chain and the child Chain can jointly construct a communication channel, which is called a Relay Chain (Relay Chain) in the system and used for data exchange between the chains.
The invention comprehensively considers conditions such as application network communication states, transaction data and the like, provides a massive real-time Internet of things-oriented chain linking method based on a novel nested chain architecture, realizes dynamic sensing of a sub-chain communication node based on machine learning, optimizes node intelligent selection and model updating, ensures high efficiency of communication between a parent chain and a sub-chain, and builds a stable and highly expandable sub-chain.
The operation flow of the block chain system of the present invention is shown in fig. 1, and specifically includes the following steps:
step 1: raw data processing
The method comprises the steps that the Internet of things equipment sends original data to a sub chain through a gateway, firstly, the gateway conducts identity verification on the Internet of things equipment, and after the verification is passed, preprocessing is conducted on the original data before chain linking and the original data are sent to the sub chain.
Step 2: request sending
The child chain initiates a communication request to the parent chain and sends the request to a system ordering service (controlled by a system administrator);
and step 3: communication (transaction) node selection
Defining a sub-chain to realize node selection every M times of transactions, and selecting a high-efficiency node by the sub-chain according to situation perception of nodes in the chain to serve as a communication node accessed to a parent chain; the parent chain has a fixed communication node for each child chain. Aiming at the selection process of the optimized access node of the sub-chain, the invention utilizes an improved GCN (graph convolutional neural network) algorithm to sense and classify the nodes, as shown in figure 3, thereby effectively screening out efficient nodes in the sub-chain in time for inter-chain communication and ensuring that application data is complete and fast to chain.
3.1 map construction
And constructing a transaction graph by using the characteristic attributes of the nodes in the block chain and the transaction information among the nodes, wherein the transaction graph is used as the input of a neural network model, and each transaction graph is a directed graph G = (V, E) which is composed of the nodes and edges and contains edge information, wherein V is the nodes, and E is the edges. The total number of nodes N = | V |, the edge E = { (N) i ,n j ,t)|n i ,n j E.g., V) represents a transaction initiated by the node i to the node j, wherein the transaction type is t (such as asset transfer, ledger query and the like).
The graph construction process mainly comprises the following key parameters:
node feature matrix
Figure BDA0003595688060000071
The characteristic attribute of the kth node is represented as:
Figure BDA0003595688060000072
Figure BDA0003595688060000073
f 1 number of transactions initiated for the round, f 2 Number of transactions initiated for previous round, s 1 Is the current node type, s 2 Is of the previous wheel node type.
Weight matrix
Figure BDA0003595688060000074
A transaction weight matrix of type r, the weight matrix being defined by transaction weights
Figure BDA0003595688060000075
And constructing, namely the number of times a certain edge in the transaction graph is constructed (the transaction number from the node i to the node j in the current round).
Transaction delay matrix
Figure BDA0003595688060000076
By
Figure BDA0003595688060000077
Constructing, wherein the value represents the transaction delay level of the type r from the node i to the node j in M transactions in the current round, the order of the transaction delay level is preset to be n (namely, n delay levels are provided in total), and the extreme value t of all transaction delays in the current round is taken max 、t min Push-button
Figure BDA0003595688060000078
And (5) grading uniformly. Average transaction delay of type r between node i and node j in the current round
Figure BDA0003595688060000079
Figure BDA00035956880600000710
Determining t from a rank-dividing range cur The grade is obtained
Figure BDA00035956880600000711
Network delay matrix
Figure BDA00035956880600000712
By
Figure BDA00035956880600000713
Construct the value representing the type r from node i to node j in M transactions of the current roundThe network environment delay level of the transaction is divided into n levels, and the network ping value t of each transaction with the type r in the current round is counted max 、t min The same procedure as above is as follows
Figure BDA00035956880600000714
Uniformly grading, calculating average network time delay, and determining grade to obtain
Figure BDA00035956880600000715
3.2 Picture learning
The GCN model is initially input as a matrix generated by graph construction, then node states are updated through hierarchical propagation, and a propagation model of node forward update is defined as:
Figure BDA0003595688060000081
wherein
Figure BDA0003595688060000082
Representing the hidden state of the ith node in the l +1 layer neural network;
alpha and beta are respectively the weight of transaction delay and network delay, and alpha + beta =1;
σ is a ReLU activation function;
normalization factor
Figure BDA0003595688060000083
(
Figure BDA0003595688060000084
A node set representing that r type transaction is performed with the node i in the current round);
Figure BDA0003595688060000085
a weight matrix representing the first layer neural network with transaction type r.
And defining the iteration times of the state vector as T, namely l is less than or equal to T. Model (model)The input of the l-th layer can be expressed as
Figure BDA0003595688060000086
Wherein H (0) = V, forward propagation makes a total of T state updates.
3.3 node Classification and parent chain Co-evaluation
Obtaining the state vector of each node after T iterations in the last layer of the GCN model
Figure BDA0003595688060000087
Where t is the output feature number of each node, i.e., the node class number. For each node application
Figure BDA0003595688060000088
Mapping the output value of the model into a probability value to obtain the classification probability of each node
Figure BDA0003595688060000089
The vector represents the probability that the ith node is in the t categories respectively, namely the probability values of the nodes which are respectively used as an access node, a candidate node, a common node and an inefficient node, and the maximum probability is taken as the node type. Meanwhile, the access node selected by the child chain is evaluated by the parent chain according to the historical update information of the node, and if the history of the node is used as the times T of the low-efficiency node>Threshold Th, the parent chain requests the child chain to replace the access node from the list of candidate nodes.
And step 3: data transmission
And the sequencing service establishes a channel and adds the communication nodes selected by the two parties into the channel to form a relay chain. The sub-chain communication nodes read the designated data from the chain, and submit the data to the relay chain after the data is processed by the specific intelligent contract. In order to avoid the overhead caused by the transmission of a large amount of data on the chain, the sub-chain only uploads the processed hash abstract of the data of the Internet of things to the main chain.
And 4, step 4: data verification and validation
The two communication nodes in the relay chain reach consensus, data is written into local blocks of the two communication nodes, and the communication node of the parent chain reads the data from the local blocks, submits the data to the chain after verifying the integrity and consistency of the received data and reaches the consensus, so that data exchange is completed.
And 5: transaction information storage
After each transaction is completed, the transaction event is stored in the sub-chain in a key-value pair mode for next node selection, and the attributes are as follows: < sender, receiver, type, transaction delay, network delay >, respectively, represent a transaction initiator, a transaction receiver, a transaction type, a transaction delay (in ms), and a network delay (in ms). If the transaction passes through the process of selecting the child chain nodes, the type updating event (in the form of key value pairs) of each node is also stored in the child chain, and the attributes include < ID, category, transactions >, which respectively represent the node ID, the node type after the update, and the number of transactions initiated by the node in the current round. The node update information is also sent to the relay chain and then backed up in the parent chain for evaluation of child chain nodes by the parent chain.
Examples
First, the device identity is verified by the gateway before the internet of things device sends the raw data to the blockchain, and if the internet of things device is not registered on the sub-chain, the gateway registers a new identity for the device by a CA (certificate authority) contacting the blockchain. After the identity authentication is passed, original data are integrated into a json key value pair form by a gateway, the original data are encrypted and stored under a chain for data which are difficult to process, and the hash abstract and the storage address of the original data are sent to the chain.
After receiving the data, the sub-chain sends a communication request to the parent chain, meanwhile, high-efficiency nodes are selected in the chain for communication, and if the transaction is the Kth time (K < M) in the round, the sub-chain directly takes the access node selected by the previous round as a communication node; if the transaction is the Mth time, node classification and selection are carried out:
the basic parameters are assumed to be as follows: in the nested chain architecture, one sub-chain is 3 nodes, a node set N = { a, B, C }, a transaction period M =10, a transaction type r =2, a delay level order N =5, a weight α =0.8, β =0.2, an iteration number T =2, and a threshold Th =2.
Assume that the 10 transaction events in this round are as follows:
<A,B,1,28,56><A,C,1,34,69><B,A,2,150,45><C,A,1,25, 47><A,B,2,197,77><C,B,1,68,29><A,B,2,99,57><B,A,2, 165,49><B,C,1,86,55><C,B,1,39,37>
the sub-chain first reads the transaction information of the round of 10 times, counts the number of times each node participates in the transaction, and simultaneously can read the current type of the node and the type of the previous round of the node from the node updating event, as shown in the following table. The four node types (access node, candidate node, normal node, low efficiency node) are labeled 1-4, respectively.
Firstly, initializing a node feature vector according to historical node information and transaction information of the current round stored in a sub-chain:
Figure BDA0003595688060000101
as shown in table 1.
TABLE 1 node feature vector
v 1 =[3,2,2,2]
v 2 =[2,1,4,1]
v 3 =[2,3,3,1]
From which a node-feature matrix V is constructed as model input, i.e.
Figure BDA0003595688060000102
And constructing a weight matrix, a transaction delay matrix and a network delay matrix according to the 10 transaction events of the round.
For the weight matrix, for example, when transaction type r =1, the number of transactions from node a to node B is3, then
Figure BDA0003595688060000103
The same can be said to be given in Table 2. The same can be said for table 3 when transaction type r =2.
TABLE 2 weight matrix W r (r=1)
Figure BDA0003595688060000104
TABLE 3 weight matrix W r (r=2)
Figure BDA0003595688060000105
For transaction latency, when r =1, max =86ms, min =25ms, with an interval of
Figure BDA0003595688060000106
The delay is divided into 5 levels according to this, e.g. average trade delay from node C to node B
Figure BDA0003595688060000107
The range is divided according to the time delay,
Figure BDA0003595688060000108
see table 4; the same holds for r =2, from which the intervals are calculated and ranked as shown in table 5.
TABLE 4 transaction delay matrix T r (r=1)
Figure BDA0003595688060000111
TABLE 5 transaction delay matrix T r (r=2)
Figure BDA0003595688060000112
For network delay, the above steps are respectively used for carrying out delay grade division on different transaction types, as shown in table 6 and table 7.
TABLE 6 network delay matrix L r (r=1)
Figure BDA0003595688060000113
TABLE 7 network delay matrix L r (r=2)
Figure BDA0003595688060000114
And substituting the defined forward propagation model to obtain the output of the next hidden layer, and obtaining the final state vector of the node after 2 iterations (such as fig. 4).
The classification probability for each node is obtained using Softmax normalization, for example as shown in fig. 5 for node a.
The classification probability values of the node B and the node C obtained in the same manner are shown in tables 8 and 9.
TABLE 8 node B Classification probability values
0.31 Access node
0.43 Candidate node
0.24 Common node
0.02 Inefficient node
TABLE 9 node C Classification probability values
0.03 Access node
0.05 Candidate node
0.13 Common node
0.79 Inefficient node
And classifying according to the maximum probability to obtain the node A as an access node, the node B as a candidate node and the node C as a low-efficiency node in the current round. The child chain selects the node A as a communication node accessed to the parent chain according to the classification result, meanwhile, the number of times that the parent chain can count the history of the node A as an inefficient node in a local record is assumed to be 3,3 > 2 (threshold), so that the node A does not meet the condition of being used as an access node, the parent chain requests the child chain to replace the node A with a candidate node B, the child chain selects the node B as the communication node after receiving the request, and the sequencing service establishes a relay chain for data exchange by using the communication node of the parent chain. The sub-chain sends the hash of the processed data of the Internet of things to the main chain through the relay chain, and the data transmission on the chain is completed. Meanwhile, the sub-chain requests a public key of the client from the main chain, the public key is used for encrypting data and then performing down-chain transmission, the main chain receives the data and then decrypts the data by using a private key of the client, a new hash is generated and compared with an on-chain hash, if the hash values are consistent, the data are submitted into the chain and consensus is completed, and communication is finished; if the values are inconsistent, the data are modified in the transmission process, the parent chain discards the values and notifies the child chain, and the child chain can request to upload the data again or end the communication. After the communication is completely finished, the sub-chain waits for the data uplink application of the next piece of internet-of-things equipment, and the flow of the case is repeated.
The invention designs a novel nested chain architecture aiming at the challenge that network data applied under a chain is difficult to upload to a block chain due to mass scale and high real-time performance, realizes the cooperation of information under the chain and data on the chain by utilizing a mechanism of parent-child chain coexistence, provides a child chain node control mechanism integrating sensing, selection and evaluation, and ensures the stable communication between the child chain and the parent chain and the efficient chaining of the data.
The above examples are only intended to illustrate the technical solution of the present invention, and not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: it is to be understood that modifications may be made to the technical solutions described in the foregoing embodiments, or equivalents may be substituted for some of the technical features thereof, but such modifications or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A massive real-time Internet of things-oriented chain loading method based on a novel nested chain architecture is characterized in that a block chain system consists of a single parent chain and a plurality of sub-chains, and the constituent nodes of the parent chain and the sub-chains are equally divided into two types: the common node is only responsible for the local data management function; the communication node has the same function as a common node and also has a cross-link communication function; the communication nodes in the parent chain and the child chain together construct a communication channel, namely a relay chain, which is used for data exchange among the chains; the sub-chain coexists with the parent chain in a nested structure and is used for realizing dynamic sensing of sub-chain communication nodes based on machine learning for large-scale application data under the link, searching malicious nodes, efficiently selecting and replacing parent chain access nodes and realizing high-availability sub-chain dynamic access.
2. The mass real-time internet of things oriented uplink method based on the novel nested chain architecture as claimed in claim 1, wherein the selection process of the sub-chain access nodes is to use an improved GCN algorithm to sense and classify the nodes, so as to screen out efficient nodes in the sub-chain for inter-chain communication.
3. The massive real-time internet of things-oriented uplink method based on the novel nested chain architecture as claimed in claim 2, wherein the selection process of the sub-chain access node is as follows:
s31, graph construction:
constructing transaction graphs by using the characteristic attributes of the nodes in the block chain and the transaction information among the nodes, wherein each transaction graph is a directed graph which is composed of the nodes and edges and contains edge information and is used as the input of a neural network model;
s32, image learning:
the GCN model initially inputs a matrix generated by graph construction, and then node states are updated through hierarchical propagation;
s33, node classification and parent chain collaborative evaluation:
obtaining the state vector of each node after T iterations in the last layer of the GCN model
Figure FDA0003595688050000011
Wherein t is the output characteristic number of each node, namely the node category number; for each node application
Figure FDA0003595688050000012
Mapping the model output value into a probability value to obtain the classification probability of each node:
Figure FDA0003595688050000013
the vector represents the probability that the ith node is in the t categories respectively, namely the probability values of the nodes which are respectively used as an access node, a candidate node, a common node and an inefficient node, and the maximum probability is taken as the node type to obtain the classification probability of each node; meanwhile, the father chain evaluates the access node selected by the sub-chain according to the historical update information of the node, and if the node is the nodeNumber of times T of point history as inefficient node>Threshold Th, the parent chain requests the child chain to replace the access node from the list of candidate nodes.
4. The massive real-time internet of things-oriented uplink method based on the novel nested chain architecture as claimed in claim 3, wherein the graph construction process mainly comprises the following key parameters:
node feature matrix
Figure FDA0003595688050000021
The characteristic attribute of the kth node is represented as:
Figure FDA0003595688050000022
Figure FDA0003595688050000023
f 1 number of transactions initiated for the round, f 2 Number of transactions initiated for previous round, s 1 For the current node type, s 2 Is the type of the node of the previous wheel;
weight matrix
Figure FDA0003595688050000024
A transaction weight matrix of type r, the weight matrix being defined by transaction weights
Figure FDA0003595688050000025
Constructing, namely the number of times that a certain edge in the transaction graph is constructed, namely the transaction number from the node i to the node j in the current round;
transaction delay matrix
Figure FDA0003595688050000026
By
Figure FDA0003595688050000027
Constructing a value representing the transaction delay level of the type r from the node i to the node j in the M transactions in the current round, and the order of the transaction delay levelSetting n, i.e. there are n delay levels in total, and taking the extreme value t of all transaction delays in the round max 、t min Push-button
Figure FDA0003595688050000028
Grading uniformly; average transaction delay of type r between node i and node j in the current round
Figure FDA0003595688050000029
Figure FDA00035956880500000210
Determining t from a rank-dividing range cur The grade is obtained
Figure FDA00035956880500000211
Network delay matrix
Figure FDA00035956880500000212
By
Figure FDA00035956880500000213
Constructing, wherein the value represents the delay level of the network environment when the transaction with the type r is carried out from the node i to the node j in the M transactions in the current round, the delay level is divided into n levels, and the network ping value t of each transaction with the type r in the current round is counted max 、t min Push-button
Figure FDA00035956880500000214
Uniformly grading, calculating average network time delay, and determining grade to obtain
Figure FDA00035956880500000215
5. The mass real-time internet of things oriented uplink method based on the novel nested chain architecture as claimed in claim 3, wherein in the graph learning process, a node forward update propagation model is defined as:
Figure FDA00035956880500000216
wherein
Figure FDA00035956880500000217
Representing the hidden state of the ith node in the l +1 layer neural network;
alpha and beta are respectively the weight of transaction delay and network delay, and alpha + beta =1;
σ is a ReLU activation function;
normalization factor
Figure FDA00035956880500000218
Figure FDA00035956880500000219
A node set representing that r type transaction is carried out between the current round and the node i;
Figure FDA00035956880500000220
a weight matrix representing the first layer neural network with transaction type r.
6. The mass real-time Internet of things-oriented uplink method based on the novel nested chain architecture as claimed in claim 4, wherein in the graph learning process, the iteration number of the state vector is defined as T, i.e. l is less than or equal to T; the input at the model level I is represented as
Figure FDA0003595688050000031
Wherein H (0) = V, forward propagation takes a total of T state updates.
7. The massive real-time internet of things-oriented uplink method based on the novel nested chain architecture as claimed in any one of claims 1 to 6, comprising the following steps:
s1, original data processing: the method comprises the steps that the Internet of things equipment sends original data to a sub chain through a gateway, firstly, the gateway conducts identity verification on the Internet of things equipment, and after the verification is passed, preprocessing is conducted on the original data before chain linking and the original data are sent to the sub chain;
s2, request sending:
the sub-chain initiates a communication request to the parent chain and sends the request to a system sequencing service;
s3, selecting a communication transaction node:
defining a sub-chain to realize node selection every M times of transactions, and selecting a high-efficiency node by the sub-chain according to situation perception of nodes in the chain to serve as a communication node accessed to a parent chain; the parent chain has a fixed communication node for each sub-chain;
s4, data transmission:
the sequencing service establishes a channel and adds the communication nodes selected by the two parties into the channel to form a relay chain, and the sub-chain communication nodes read specified data from the chain and submit the data to the relay chain after being processed by a specific intelligent contract;
s5, data verification and confirmation:
the two communication nodes in the relay chain reach consensus, data is written into local blocks of the two communication nodes, and the communication node of the parent chain reads the data from the local, and submits the data to the chain and reaches consensus after verifying the integrity and consistency of the received data, so as to complete data exchange;
s6, transaction information storage:
after each transaction is completed, the transaction event is stored in the sub-chain in a key-value pair mode for next node selection, and node updating information is simultaneously sent to the relay chain and then backed up in the parent chain for evaluation of the parent chain on the sub-chain node.
8. The massive real-time internet of things-oriented uplink method based on the novel nested chain architecture as claimed in claim 7, wherein in step S4, the sub-chain uploads only the hash digest of the processed internet of things data to the main chain.
9. The mass real-time internet of things oriented uplink method based on the novel nested chain architecture as claimed in claim 7, wherein in step S6, transaction information attributes are as follows: < sender, receiver, type, transaction delay, network delay >, sender represents a transaction initiator, receiver represents a transaction receiver, type represents a transaction type, transaction delay represents a transaction delay (in ms), and network delay represents a network delay.
10. The mass real-time internet of things oriented uplink method based on the novel nested chain architecture as claimed in claim 9, wherein if the transaction passes through a sub-chain node selection process, a type update event of each node is stored in a sub-chain in a key value pair form, the attribute includes < ID, category, transactions >, the ID represents a node ID, the category represents a node type after the update, and the transactions represents a transaction number initiated by the node of the current round.
CN202210413649.0A 2022-04-14 2022-04-14 Novel nested chain architecture-based massive real-time Internet of things-oriented uplink method Active CN115150246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210413649.0A CN115150246B (en) 2022-04-14 2022-04-14 Novel nested chain architecture-based massive real-time Internet of things-oriented uplink method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210413649.0A CN115150246B (en) 2022-04-14 2022-04-14 Novel nested chain architecture-based massive real-time Internet of things-oriented uplink method

Publications (2)

Publication Number Publication Date
CN115150246A true CN115150246A (en) 2022-10-04
CN115150246B CN115150246B (en) 2023-06-30

Family

ID=83407252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210413649.0A Active CN115150246B (en) 2022-04-14 2022-04-14 Novel nested chain architecture-based massive real-time Internet of things-oriented uplink method

Country Status (1)

Country Link
CN (1) CN115150246B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234677A (en) * 2018-03-09 2018-06-29 高飞 A kind of block chain network node serve device towards multi-tiling platform chain
CN110035440A (en) * 2019-04-11 2019-07-19 东南大学 A kind of new distribution type access planar network architecture based on block chain
US20190253263A1 (en) * 2018-11-16 2019-08-15 Alibaba Group Holding Limited Cross-chain interactions using a domain name scheme in blockchain systems
US20190340267A1 (en) * 2018-05-01 2019-11-07 International Business Machines Corporation Blockchain implementing cross-chain transactions
WO2020028589A1 (en) * 2018-07-31 2020-02-06 Americorp Investments Llc Techniques for expediting processing of blockchain transactions
US20200107362A1 (en) * 2018-09-27 2020-04-02 Samsung Electronics Co., Ltd. Power control in integrated access and backhaul
CN111464335A (en) * 2020-03-10 2020-07-28 北京邮电大学 Intelligent service customization method and system for endogenous trusted network
WO2021012812A1 (en) * 2019-07-19 2021-01-28 南京瑞祥信息技术有限公司 Public chain-based blockchain network addressing method
US20210065118A1 (en) * 2019-08-28 2021-03-04 One Network Enterprises, Inc. System and computer program for providing high delivery performance in a value chain
CN112468309A (en) * 2019-09-06 2021-03-09 傲为信息技术(江苏)有限公司 Domain name management system based on intelligent contract
CN113643040A (en) * 2021-08-14 2021-11-12 深圳众享互联科技有限公司 Cross-block-chain transaction verification method
US20210399904A1 (en) * 2020-06-19 2021-12-23 Ricoh Company, Ltd. Method for managing consortium chain data structure network, management node, and non-transitory computer-readable recording medium
US20220036346A1 (en) * 2020-07-28 2022-02-03 Sensoriant, Inc. Systems and methods for re-organizing blockchains for efficient operations
WO2022027531A1 (en) * 2020-08-03 2022-02-10 西安电子科技大学 Blockchain construction method and system, and storage medium, computer device and application
CN114238504A (en) * 2021-12-14 2022-03-25 辽宁大学 E-government-oriented cross-chain data query and consensus optimization method

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234677A (en) * 2018-03-09 2018-06-29 高飞 A kind of block chain network node serve device towards multi-tiling platform chain
US20190340267A1 (en) * 2018-05-01 2019-11-07 International Business Machines Corporation Blockchain implementing cross-chain transactions
WO2020028589A1 (en) * 2018-07-31 2020-02-06 Americorp Investments Llc Techniques for expediting processing of blockchain transactions
US20200107362A1 (en) * 2018-09-27 2020-04-02 Samsung Electronics Co., Ltd. Power control in integrated access and backhaul
US20190253263A1 (en) * 2018-11-16 2019-08-15 Alibaba Group Holding Limited Cross-chain interactions using a domain name scheme in blockchain systems
CN110035440A (en) * 2019-04-11 2019-07-19 东南大学 A kind of new distribution type access planar network architecture based on block chain
WO2021012812A1 (en) * 2019-07-19 2021-01-28 南京瑞祥信息技术有限公司 Public chain-based blockchain network addressing method
US20210065118A1 (en) * 2019-08-28 2021-03-04 One Network Enterprises, Inc. System and computer program for providing high delivery performance in a value chain
CN112468309A (en) * 2019-09-06 2021-03-09 傲为信息技术(江苏)有限公司 Domain name management system based on intelligent contract
CN111464335A (en) * 2020-03-10 2020-07-28 北京邮电大学 Intelligent service customization method and system for endogenous trusted network
US20210399904A1 (en) * 2020-06-19 2021-12-23 Ricoh Company, Ltd. Method for managing consortium chain data structure network, management node, and non-transitory computer-readable recording medium
US20220036346A1 (en) * 2020-07-28 2022-02-03 Sensoriant, Inc. Systems and methods for re-organizing blockchains for efficient operations
WO2022027531A1 (en) * 2020-08-03 2022-02-10 西安电子科技大学 Blockchain construction method and system, and storage medium, computer device and application
CN113643040A (en) * 2021-08-14 2021-11-12 深圳众享互联科技有限公司 Cross-block-chain transaction verification method
CN114238504A (en) * 2021-12-14 2022-03-25 辽宁大学 E-government-oriented cross-chain data query and consensus optimization method

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
R. BELCHIOR等: "A survey on blockchain interoperability: Past, present, and future trends", 《ACM COMPUTING SURVEYS》, vol. 54, no. 8, pages 1 - 41 *
YUCHAO ZHANG等: "Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains", 《IEEE NETWORK》, vol. 32, no. 2, pages 138 - 142 *
周坚;金瑜;何亨;李鹏;: "基于嵌套Merkle Hash tree区块链的云数据动态审计模型", 计算机应用, no. 12 *
张宇超等: "跨域场景下的联邦路由机制设计", 《智能通信技术》, no. 10, pages 30 - 33 *
石润华;石泽;: "基于区块链技术的物联网密钥管理方案", 信息网络安全, no. 08 *

Also Published As

Publication number Publication date
CN115150246B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
Maatouk et al. On the optimality of the Whittle’s index policy for minimizing the age of information
CN112765677B (en) Federal learning method, device and system based on blockchain
WO2019024780A1 (en) Light-weight processing method for blockchain, and blockchain node and storage medium
CN111866954A (en) User selection and resource allocation method based on federal learning
CN115358487A (en) Federal learning aggregation optimization system and method for power data sharing
US20220101189A1 (en) Federated inference
CN112637883A (en) Federal learning method with robustness to wireless environment change in power Internet of things
JP6553816B2 (en) User data sharing method and apparatus
CN115688913A (en) Cloud-side collaborative personalized federal learning method, system, equipment and medium
CN113902127A (en) Asynchronous federal learning method with block chain enabled
CN113886501A (en) Block chain service module extension method based on multi-chain architecture
CN110995597A (en) Method and system for selecting safe link of power communication network
Wu et al. Topology-aware federated learning in edge computing: A comprehensive survey
Tu et al. Byzantine-robust distributed sparse learning for M-estimation
Wu et al. Maximizing influence diffusion over evolving social networks
CN112766560A (en) Alliance block chain network optimization method, device and system and electronic equipment
CN112541556A (en) Model construction optimization method, device, medium, and computer program product
Zhang et al. Federated multi-task learning with non-stationary heterogeneous data
Zhang et al. Cluster-driven GNN-based Federated Recommendation with Biased Message Dropout
CN115150246A (en) Mass real-time Internet of things-oriented chain loading method based on novel nested chain architecture
WO2023061329A1 (en) Communication method applied to computer cluster, and communication apparatus
CN114265954B (en) Graph representation learning method based on position and structure information
CN114329127A (en) Characteristic box dividing method, device and storage medium
CN112581177B (en) Marketing prediction method combining automatic feature engineering and residual neural network
CN114238504A (en) E-government-oriented cross-chain data query and consensus optimization method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant